<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Restricting Access to SSIDs in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/restricting-access-to-ssids/m-p/2027618#M157547</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will need a way to distinguish your guest users from "internal users". I assume there is some attribute in AD that will allow this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming this to be the case then would add two new conditions to the authorization policy&lt;/P&gt;&lt;P&gt;- User/Guest flag (assume can get this from AD)&lt;/P&gt;&lt;P&gt;- called-station-id (RADIUS attribute). This attributes includes the SSID at the end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can then define rules&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If User/Guest flag equals "Guest" and called-station-id ends-with "Guest SSID" then &amp;lt;&amp;lt;&amp;lt;&amp;lt; allow access. Assign permissions&lt;/P&gt;&lt;P&gt;If User/Guest flag equals "Internal" and called-station-id ends-with "Internal SSID" then &amp;lt;&amp;lt;&amp;lt;&amp;lt; allow access. Assign permissions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;default rule would be to deny access&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 30 Oct 2012 13:43:28 GMT</pubDate>
    <dc:creator>jrabinow</dc:creator>
    <dc:date>2012-10-30T13:43:28Z</dc:date>
    <item>
      <title>Restricting Access to SSIDs</title>
      <link>https://community.cisco.com/t5/network-access-control/restricting-access-to-ssids/m-p/2027617#M157541</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have Configured a WLAN with WiSM2 Controller installed on a 6500 series, Aironet 3600series APs and&amp;nbsp; ACS 5.3 for userauthentication. The ACS is connected to Active directory so users are authenticating using the AD (802.1x is used and not a pre-shared key) on SSID A. I have created a separate SSID B for guest users. I have put restrictions on this SSID. Guest users are also created on the same AD where internal users are created. How can I force Guest users to connect to SSID B and not be able to connect to SSID A? Currently they can connect to both.&lt;/P&gt;&lt;P&gt;Please help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stanslaus.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:44:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restricting-access-to-ssids/m-p/2027617#M157541</guid>
      <dc:creator>IT_Data_CorporateNet</dc:creator>
      <dc:date>2019-03-11T02:44:07Z</dc:date>
    </item>
    <item>
      <title>Restricting Access to SSIDs</title>
      <link>https://community.cisco.com/t5/network-access-control/restricting-access-to-ssids/m-p/2027618#M157547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will need a way to distinguish your guest users from "internal users". I assume there is some attribute in AD that will allow this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming this to be the case then would add two new conditions to the authorization policy&lt;/P&gt;&lt;P&gt;- User/Guest flag (assume can get this from AD)&lt;/P&gt;&lt;P&gt;- called-station-id (RADIUS attribute). This attributes includes the SSID at the end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can then define rules&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If User/Guest flag equals "Guest" and called-station-id ends-with "Guest SSID" then &amp;lt;&amp;lt;&amp;lt;&amp;lt; allow access. Assign permissions&lt;/P&gt;&lt;P&gt;If User/Guest flag equals "Internal" and called-station-id ends-with "Internal SSID" then &amp;lt;&amp;lt;&amp;lt;&amp;lt; allow access. Assign permissions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;default rule would be to deny access&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Oct 2012 13:43:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restricting-access-to-ssids/m-p/2027618#M157547</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2012-10-30T13:43:28Z</dc:date>
    </item>
    <item>
      <title>Restricting Access to SSIDs</title>
      <link>https://community.cisco.com/t5/network-access-control/restricting-access-to-ssids/m-p/2027619#M157558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was going to suggest a similar way to the post above ^&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're using AD, you can enforce policies based on your schema to set the guest users to connect that network by default. You can't hide a single network without hiding the other unless you use some form of policy on your pdc and AAA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know how you get on.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Oct 2012 13:48:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restricting-access-to-ssids/m-p/2027619#M157558</guid>
      <dc:creator>Oliver Eve</dc:creator>
      <dc:date>2012-10-30T13:48:50Z</dc:date>
    </item>
    <item>
      <title>Restricting Access to SSIDs</title>
      <link>https://community.cisco.com/t5/network-access-control/restricting-access-to-ssids/m-p/2027620#M157582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Perfect!!! It works. Actually what i did is to create a Security groups 'GUESTS' in AD. Then create the below rule in ACS:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;'AD-AD1:ExternalGroups contains any MYDOMAIN.com/Groups/Security Groups/GUESTS And RADIUS-IETF:Called-Station-ID ends with INTERNALSSID DenyAccess'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As my objective was to deny Guests to connect to the internal SSID, then any user who is a member of that security group will be unable to connect but will be able to connect to GUESTSSID via another&amp;nbsp; rule which allows a member of Guests to connect to the GUESTSSID.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again thank you very much!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stanslaus.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Oct 2012 12:10:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restricting-access-to-ssids/m-p/2027620#M157582</guid>
      <dc:creator>IT_Data_CorporateNet</dc:creator>
      <dc:date>2012-10-31T12:10:29Z</dc:date>
    </item>
    <item>
      <title>Hi ,Actually I am also facing</title>
      <link>https://community.cisco.com/t5/network-access-control/restricting-access-to-ssids/m-p/2027621#M157600</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;Actually I am also facing the same issue where I want to restrict one ssid to one group wherein that group will not able to connect any other ssid.&lt;/P&gt;&lt;P&gt;Currently m having 7.4.121 WLC controller and ISE 1.2.1 can any one tell me how to configure this requirment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Pranav&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2014 13:08:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restricting-access-to-ssids/m-p/2027621#M157600</guid>
      <dc:creator>Pranav Gade</dc:creator>
      <dc:date>2014-08-13T13:08:34Z</dc:date>
    </item>
  </channel>
</rss>

